Entry
Reader's guide
Entries A-Z
Subject index
Hacking
Computer hacking involves the manipulation of computer software and hardware or other technologies with criminal or noncriminal intent. Hacking is a phenomenon that has grown in prominence over the past 30 years with the increasing societal dependence on technology for all facets of life. Initially, the notion of computer hacking was nondeviant and associated with the ability to manipulate technology efficiently and effectively in novel ways. Over time, however, the concept of hacking took a more malicious turn due to its use in attacks against consumers and businesses. Today, computer hacking is viewed by many in the general public as one of the most dangerous forms of cybercrime. In fact, hacking has been equated with burglary in the real world due to the fact that a hacker often violates invisible lines of ownership to gain access to sensitive data or ideas. As a consequence, hacking has been incorporated into some states' criminal statutes under existing codes for burglary and robbery.
Hacking is a skill that can be applied in a variety of malicious and nonmalicious ways against both human and technological resources. For instance, hackers who modify programs to subvert security protocols could engage in this act to identify weaknesses in existing security infrastructures and better protect a computer network. This same practice could, however, be used to gain access to protected resources in furtherance of illegal acts ranging from stealing credit cards to acts of terror. The act of hacking is also largely equated with the use of malicious software and highly technical or complex programming. While it is true that some of the most ingenious hacks involve a sophisticated understanding of technology and sufficient skill, many hacks can be completed by preying on human nature. For instance, individuals can guess the password to an e-mail account based on what they know about the owners' lifestyle and family due to the tendency to use personal information to help create easy-to-recall passwords. Alternatively, a password can be obtained by “shoulder surfing,” or surreptitiously looking at individual keystrokes when entering information. Thus, hacking can involve basic techniques as well as more sophisticated applications of knowledge.
Characteristics of Hackers
Although many may think of hackers as being loners who have difficulties associating with others, this stereotype is generally false. Hackers can be gregarious and social and participate in a vibrant subculture that exists primarily in online communities across the world. There are hundreds if not thousands of web forums, blogs, bulletin boards, newsgroups, and e-mail lists related to hacking. Individuals commonly belong to many communities at once to stay abreast of changing technologies and innovative hacks. The information provided by others in online environments fosters a deep desire to understand technology at profound levels and acts as a source of inspiration and social support for those with an interest in hacking. The individual hackers who participate in these communities often use handles, or nicknames, to protect their real identity and develop an online persona that expresses themselves and their interests. A handle can also be used as a means to identify hackers in the real world at conferences and local meetings of security or technology clubs.
...
- Crime, Property
- Crime, Sex
- Crime, Violent
- Crime, White-Collar/Corporate
- Defining Deviance
- Changing Deviance Designations
- Cognitive Deviance
- Conformity
- Constructionist Definitions of Social Problems
- Death of Sociology of Deviance
- Defining Deviance
- Folk Crime
- Hegemony
- Homecomer
- Marginality
- Medicalization of Deviance
- Normal Deviance
- Normalization
- Norms and Societal Expectations
- Positive Deviance
- Positivist Definitions of Deviance
- Primary and Secondary Deviance
- Secret Deviance
- Social Change and Deviance
- Solitary Deviance
- Stranger
- Taboo
- Urban Legends
- Deviance in Social Institutions
- Deviant Subcultures
- Biker Gangs
- Body Modification
- Cockfighting
- Cosplay and Fandom
- Cults
- Dogfighting
- Drag Queens and Kings
- Eunuchs
- Female Bodybuilding
- Fortune-Telling
- Gangs, Street
- Goth Subculture
- Hooliganism
- Metal Culture
- Nudism
- Professional Wrestling
- Punk Subculture
- Rave Culture
- Roller Derby
- Satanism
- Skinheads
- Straight Edge
- Suspension
- Vegetarianism and Veganism
- Discrimination
- Drug Use and Abuse
- Age and Drug Use
- Alcohol and Crime
- Club Drugs
- Cocaine
- Decriminalization and Legalization
- Designer Drugs
- Drug Dependence Treatment
- Drug Normalization
- Drug Policy
- Drug War (War on Drugs)
- Gender and Drug Use
- Heroin
- Legal Highs
- Marijuana
- Methamphetamine
- Performance-Enhancing Drugs
- Prescription Drug Misuse
- Race/Ethnicity and Drug Use
- Socioeconomic Status and Drug Use
- Tobacco and Cigarettes
- Marriage and Family Deviance
- Measuring Deviance
- Mental and Physical Disabilities
- Methodology for Studying Deviance
- Autoethnography
- Collecting Data Online
- Cross-Cultural Methodology
- Edge Ethnography
- Ethics and Deviance Research
- Ethnography and Deviance
- Institutional Review Boards and Studying Deviance
- Interviews
- Participant Observation
- Qualitative Methods in Studying Deviance
- Quantitative Methods in Studying Deviance
- Self-Report Surveys
- Triangulation
- Self-Destructive Deviance
- Sexual Deviance
- Autoerotic Asphyxiation
- Bead Whores
- Bestiality
- Bisexuality
- Bondage and Discipline
- Buckle Bunnies
- Erotica Versus Pornography
- Escorts
- Feederism
- Fetishes
- Furries
- Intersexuality
- Masturbation
- Necrophilia
- Pornography
- Public Sex
- Road Whores
- Sadism and Masochism
- Sex Tourism
- Sexual Addiction
- Sexual Harassment
- Strippers, Female
- Strippers, Male
- Tearooms
- Transgender Lifestyles
- Transsexuals
- Transvestism
- Voyeurism
- Social and Political Protest
- Social Control and Deviance
- Studying Deviant Subcultures
- Technology and Deviance
- Theories of Deviance, Macro
- Anomie Theory
- Broken Windows Thesis
- Chicago School
- Code of the Street
- Conflict Theory
- Feminist Theory
- Institutional Anomie Theory
- Marxist Theory
- Peacemaking Criminology
- Queer Theory
- Routine Activity Theory
- Social Disorganization Theory
- Social Reality Theory
- Southern Subculture of Violence
- Structural Functionalism
- Theories of Deviance, Micro
- Accounts, Sociology of
- Biosocial Perspectives on Deviance
- Constructionist Theories
- Containment Theory
- Control Balance Theory
- Control Theory
- Differential Association Theory
- Dramaturgy
- Drift Theory
- Focal Concerns Theory
- General Strain Theory
- Identity
- Identity Work
- Individualism
- Integrated Theories
- Labeling Approach
- Neutralization Theory
- Phenomenological Theory
- Rational Choice Theory
- Reintegrative Shaming
- Self-Control Theory
- Self-Esteem and Deviance
- Self, The
- Social Bonds
- Social Learning Theory
- Sociolinguistic Theories
- Somatotypes: Sheldon, William
- Symbolic Interactionism
- Transitional Deviance
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches